CISA Advisory Updated Response to CISA Advisory (AA24-109A): Akira Ransomware ByFrancis Guibernau November 18, 2025November 19, 2025
CISA Advisory Response to CISA Advisory (AA25-266A): CISA Shares Lessons Learned from an Incident Response Engagement ByAyelen Torello September 24, 2025September 24, 2025
CISA Advisory Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System ByAyelen Torello September 4, 2025September 4, 2025
CISA Alert Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities ByFrancis Guibernau July 30, 2025August 12, 2025
Adversary Emulation [CISA AA25-203A] #StopRansomware: Interlock ByFrancis Guibernau July 25, 2025August 1, 2025
Adversary Emulation Response to CISA Advisory (AA25-163A): Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider ByIan Rogers June 16, 2025July 30, 2025
Adversary Emulation Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations ByFrancis Guibernau May 22, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025July 21, 2025
#StopRansomware [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025July 31, 2025
Cybersecurity Advisory Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025July 31, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure ByFrancis Guibernau September 10, 2024July 31, 2025
AttackIQ CISA and NSA’s Top 10 Control Misconfigurations? Use BAS and MITRE ATT&CK to Defend Against Them ByAttackIQ Team December 12, 2023July 21, 2025
Security Controls The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. ByJonathan Reiber April 9, 2021July 31, 2025
Security Control Validation Before the Election, States Need to Test their Cybersecurity Continuously ByJonathan Reiber June 4, 2020July 31, 2025